Distributed Computing MCQ's




Question 631 :
Which one of the following is not shared by threads?


  1. program counter
  2. stack register
  3. program counter and stack
  4. register
  

Question 632 :
________determines when it will be necessary to transfer the process from one node to another.


  1. Selection policy
  2. Transfer policy
  3. Location policy
  4. Security policy
  

Question 633 :
Electronic Health Care Systems are examples of _________ Systems.


  1. Distributed Computing
  2. Distributed Information
  3. Distributed pervasive
  4. Distributed Database
  

Question 634 :
No special machines manage the network of architecture in which resources are known as


  1. Peer-to-Peer
  2. Space based
  3. Tightly coupled
  4. Loosely coupled
  

Question 635 :
It Places replicas one by one each time exhaustively evaluating all possible locations.


  1. Greedy Approach for replica Management.
  2. Hotspot for replica Management.
  3. Sequential Replica Management
  4. Parallel Replica Management
  

Question 636 :
What are the characteristics of transaction semantics ?


  1. Suitable for applications that are concerned about coherence of data
  2. The users of this model are interested in the atomicity property for their transaction
  3. Easy to implement in a single processor system
  4. Write-back enhances access performance
  

Question 637 :
In order to join or leave a group each process has to broadcast a message.


  1. flat group
  2. IETF group
  3. Collected process Group
  4. Hierarchical Group
  

Question 638 :
Suspending, migrating all resources as well as process and then resuming is known as ______.


  1. Total Freezing
  2. Pre Transferring
  3. On demand Exchange
  4. On demand migration
  

Question 639 :
Single coordinator approach has the following advantages :


  1. Simple implementation
  2. Simple deadlock handling
  3. Bottleneck
  4. All of the mentioned
  

Question 640 :
The method(s) that is/are used for backward recovery in distributed computing is ______.


  1. Checkpoint
  2. Message Logging
  3. Checkpoint and message logging
  4. Recovery Point
  

Question 641 :
In Distributed system, _____ can be hidden


  1. Replication
  2. Fault tolerance
  3. concurrency
  4. Consistency
  

Question 642 :
What are the characteristics of process migration?


  1. transfer data by entire file or immediate portion required
  2. transfer the computation rather than the data
  3. execute an entire process or parts of it at different sites
  4. execute limited portion of data
  

Question 643 :
Which system call returns the process identifier of a terminated child?


  1. wait
  2. exit
  3. fork
  4. get
  

Question 644 :
Following is concerned with extension and improvements of distributed system -


  1. openness
  2. concurrency
  3. fault tolerance
  4. Resource sharing
  

Question 645 :
Fault tolerance is a ______ requirement that requires a system to continue to operate,even in the presence of faults


  1. Non-functional
  2. Functional
  3. Concurrent
  4. Redundant
  

Question 646 :
Each process should get fair chance to execute the critical region, defines which property of mutual exclusion?


  1. Safety
  2. Liveness
  3. Fairness
  4. Scheduling
  

Question 647 :
TCP is reliable _______ protocol which supports reliable point to point communication in distributed system.


  1. network
  2. transport
  3. communication
  4. system
  

Question 648 :
What are the advantages of file replication ?


  1. Improves availability -performance
  2. Decreases performance
  3. They are consistent
  4. Improves speed
  

Question 649 :
The characteristics of NFS protocol are i. Search for file within directory ii.Read a set of directory entries iii. Manipulate links and directories From given options, which one is true?


  1. i,iii
  2. ii,iii
  3. i,ii,iii
  4. iii
  

Question 650 :
State which of the following holds true in Process Migration Statement 1: In non preemptive process migration,Process may be migrated during the course of its execution Statement 2: In preemptive process migration,Process may be migrated before it starts executing on its source node


  1. Statement 1 is correct but statement 2 is false
  2. Statement 1 is false but statement 2 is correct
  3. Both the statements are incorrect
  4. Both the statements are correct
  

Question 651 :
The use of more information gives rise to_________.


  1. Information redundancy
  2. Time redundancy
  3. Physical redundancy
  4. Data Redundancy
  

Question 652 :
Select the correct sequence for process migration


  1. freezing the process- Transfer the process- forward the message- communicate between cooperating process
  2. Transfer the process- forward the message- communicate between cooperating process-freezing the process
  3. forward the message- communicate between cooperating process-freezing the process- Transfer the process
  4. communicate between cooperating process-freezing the process- Transfer the process- forward the message
  

Question 653 :
In the tree structured directories _____________


  1. the tree has the stem directory
  2. the tree has the leaf directory
  3. the tree has the root directory
  4. the tree has no any directory
  

Question 654 :
In______computing, underlying hardware consists of a collection of similar workstations or PCs closely connected by means of a high-speed local-area network and each node runs the same operating system.


  1. mobile computing
  2. cloud computing
  3. cluster computing
  4. Peer-to-peer computing
  

Question 655 :
The difference between logical and physical clocks?


  1. Logical clocks measure the time of day and Physical clocks are used to mark relationships among events in a distributed system
  2. Both are the same
  3. Physical clocks measure the time of day and Logical clocks are used to mark relationships among events in a distributed system.
  4. Both measures the time of day.
  

Question 656 :
How can we avoid deadlock


  1. Resource Allocation must be done at once
  2. there must be a fixed number of resources to allocate
  3. all deadlock process must be aborted
  4. inversion technique can be used
  

Question 657 :
_____ is a process that prevents multiple threads or processes from accessing shared resources at the same time.


  1. Critical section
  2. Deadlock
  3. Message passing
  4. Mutual Exclusion
  

Question 658 :
Which mutual exclusion algorithm is useful when the membership of the group is unknown?


  1. Centralized
  2. Lamport’s.
  3. Token ring
  4. Decentralized Algorithm
  

Question 659 :
In RMI, the objects are passed by _____.


  1. Value
  2. Reference
  3. Value and Reference
  4. object
  

Question 660 :
___________ is act between name servers and their clients.


  1. Name machine
  2. Context
  3. Name agents
  4. Main servers
  
Pages